​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​       Home        Software        Embedded       Mechanical       Internship       Contact       Blog




1. IEEE 2018:  Blind Aid Stick: Hurdle Recognition, Simulated Perception, Android Integrated Voice Based Cooperation via GPS Along With Panic Alert System

Abstract: Evolution of technology has always been endeavored with making daily life simple. With a fast paced life everybody today is harnessing the benefits of technology except some parts of the society .One of them is the visually impaired who have to rely on others for travelling and other activities. This paper aims at providing one such theoretical model which incorporates the latest technologies to provide efficient and smart electronic aid to the blind. We have used IR sensors along with ultrasonic range finder circuit for hurdle detection. Bluetooth module which along with GPS technology and an Android application for blind, will provide voice assistance to desired location and in panic situations will send SMS alert to registered mobile numbers The basic objective of the system is to provide a convenient and easy navigation aid for unsighted which helps in artificial vision by providing information about the environmental scenario of static and dynamic objects around them.








2. IEEE 2018:  Botnets and Internet of Things Security

Abstract: The large number of insecure Internet of Things (IoT) devices with high computation power makes them an easy and attractive target for attackers seeking to compromise these devices and use them to create large-scale botnets. A botnet is a network of infected machines or bots, also called zombies, that has a command-and-control infrastructure and is used for various malicious activities such as distributed denial-of-service (DDoS) attacks (see the “Botnets” sidebar).From this kinds of attacker to the IOT device make the device more complication loss of the device. To provide the security for the iot device we are making the device protect from the attacker by tracking of the device IP address over the Network. By making the track on the Ip address, if any of the malicious IP address trying to access the device it will block the connection from unauthorized IP address.
3. IEEE 2018:  Child Safety Wearable Device
Abstract: This paper discusses the concept of a smart wearable device for little children. The major advantage of this wearable over other wearable is that it can be used in any cell phone and doesn't necessarily require an expensive smart phone and not a very tech savvy individual to operate. The purpose of this device is to help parents locate their children with ease. At the moment there are many wearable’s in the market which help track the daily activity of children and also help find the child using Wi-Fi and Bluetooth services present on the device. But Wi-Fi and Bluetooth appear to be an unreliable medium of communication between the parent and child. Therefore, the focus of this paper is to have an SMS text enabled communication medium between the child's wearable and the parent as the environment for GSM mobile communication is almost present everywhere. The parent can send a text with specific keywords such as "LOCATION" "TEMPERA TURE" "UV" "SOS" "BUZZ", etc., the wearable device will reply back with a text containing the real time accurate location of the child which upon tapping will provide directions to the child's location on Google maps app and will also provide the surrounding temperature, UV radiation index so that the parents can keep track if the temperature or UV radiation is not suitable for the child. The Prime motivation behind this project  is that we know how important technology is in our lives but it can sometimes can't be trusted, and we always need to have a secondary measure at hand. The secondary measure used in this project is the people present in the surrounding of the child who could instantly react for the Child’s safety till the parents arrives or they could contact the parents and help locate them. The secondary measure implemented was using a bright SOS Light and distress alarm buzzer present on the wearable device which when activated by the parents via SMS text should display the SOS signal brightly and sound an alarm which a bystander can easily spot as a sign of distress.
4. IEEE 2018: Poster Abstract: Data-Centric IoT Services Provisioning in Fog-Cloud Computing Systems

Abstract: Fog computing is mainly proposed for IoT applications that are geospatially distributed, large-scale, and latency sensitive. This poses new research challenges in real-time and scalable provisioning of IoT services distributed across Fog-Cloud computing platforms. Data-centric IoT services, as a dominant type of IoT services in large-scale deployments, require design solutions to speed up data processing and noti€cation, and scale up with the data volume. In this paper, we propose a service-oriented design architecture which is particularly focused on provisioning and processing data-centric IoT services over Fog-Cloud systems. In the proposed architecture, data-centric IoT services are organized in a service integrating tree structure, adhering to the hierarchical fog-based IoT computing models. A service node in the tree is empowered with features for real-time service data noti€cation, local data processing and multi-level IoT data access. .e initial results show that, along the design advantages of the proposed model, it does not impose any additional overhead as compared to state-of-the-art solutions.

5. IEEE 2018:  An NFC featured three level authentication system for tenable transaction and abridgment of ATM card blocking intricacies
Abstract:  The flexible use of credit and debit card transactions has become increasingly ubiquitous and so have the associated vulnerabilities that make them a common target for cyber criminals. Furthermore, a prevalent complication associated with blocking of ATM cards involves tedious interactive processes and even possibly long waiting times during interaction with customer care services. Using a three factor authentication scheme employing NFC (Near Field Communication: an emerging technology evolved from a combination of contact-less identification and inter connection providing data exchange), Dash Matrix Algorithm and One-time password, we describe and quantify the potential to overcome common transaction liabilities (brute force attack, Shoulder surfing, skimming of ATM cards, etc.). The auxiliary feature of blocking ATM cards is implemented using a QR code authentication scheme and NFC technology, implemented both in NFC enabled phones and non-NFC phones (with the help of an NFC transmitter, receiver and Bluetooth). The proposed system, therefore, ensures both secure usage of ATM cards and cost effectiveness by utility of novel and increasingly common technology, when also simultaneously proving to be user.
6. IEEE 2018:  A Provably Secure General Construction for Key Exchange Protocols Using Smart Card and Password
Abstract:  Key exchange protocols using both smart card and password are widely used nowadays since they provide greater convenience and stronger security than protocols using only a password. Most of these protocols are often limited to simple network systems, and they may have security risks. We propose a general construction for key exchange protocols using smart card and password to avoid these flaws. The constructed protocol from the general construction has only one additional communication round than the original public encryption scheme. This construction is proven secure under random oracle model, so it can resist several common types of attacks. It is also adapted well to various networks. Compared with related protocols, the proposed key exchange protocol generated from the general construction has better secure properties and good computational efficiency in storage cost and operation time.